Jawbone has notified some users that its MyTALK service has been hacked, with the cloud app and firmware update platform supposedly seeing names, emails, and encrypted passwords raided. The security hack was revealed in an email to registered users today, warning them that “limited user information” had been stolen, though suggesting that there was no sign of any unauthorized use of that login data, or access to account information, that Jawbone could see.
Jawbone launched the MyTALK service back in 2010, alongside the ICON Bluetooth headset, as a way to deliver not only firmware updates to its Bluetooth-enabled products, but add cloud-based services. For instance, Jawbone allows headset users to add number speed-dials to the multifunction button via MyTALK, as well as change the voice of the spoken command prompts.
As a response to the hack, Jawbone has disabled existing passwords and users must reset them if they want to log back into MyTALK. Technical details are yet to be revealed, with the company only saying that it was an “isolated attack on our system.”
Jawbone is keen to point out in its message that the passwords taken were encrypted, and as such the actual passwords themselves weren’t revealed. We’ve got a request in for more information from Jawbone and will update when we know more.
[Thanks Matt!]
Jawbone MyTALK hacked: Names, emails and encrypted passwords stolen is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.
Hacking highlight: “Sustained attack” on US called out by intelligence report
Posted in: Today's ChiliThe US is under sustained attack from a vast cyber-espionage campaign that, though broadly invisible to the public, has the potential to significantly threaten the economic performance of the country as a whole, according to a new report. China is the most active of the hacking culprits, sources tell the Washington Post having had privileged access to the new National Intelligence Estimate, but are not alone in targeting fields as broad as energy, finance, and technology in the hunt for a commercial edge. As well as technological methods of defense, the US is also apparently considering more unusual strategies to battle the growing number of state-led attacks.
Cyber-espionage has grown in prevalence and attention over the past few years, and according to one Obama administration official – speaking on the understanding of anonymity – “it’s known to be a national issue at this point.” China is widely believed to lead the field, but Russia, Israel, and France are all believed to have been called out by the new report as having “engaged in hacking for economic intelligence.”
China officially denies any government involvement or official economic strategy that includes hacking US companies, but the report is in accordance with other recent claims that Chinese employees are persuaded or coerced to steal content from their US employers or partners.
The NIE holds off from making specific claims about the exact potential for financial impact on the US economy, though there is no shortage of analyst commentary speculating on anything up to $100bn in annual losses.
Though the National Intelligence Estimate’s findings and recommendations are undoubtedly of great interest to US businesses, a public release of the report is not on the cards. A spokesperson for the department responsible for its authorship has said that there will be no unclassified summary, excerpt, or other disclosure, and that “as a matter of policy” it will not be publicly detailed.
However, the US government is expected to release a separate report on trade-secrets protection, which will detail ways in which US companies can work with legislators and lawmakers to ensure their valuable intellectual property is defended. A parallel executive order demanding voluntary standards for particularly high-profile organizations in the private sector is also tipped for release, potentially as early as this week.
Back in January, meanwhile, the US Cyber Command division – the taskforce that challenges cyber-espionage among other threats – gained new teeth for its online war. Three new teams, handling Pentagon infrastructure, US-wide infrastructure, and proactive cyber-attack, have been formulated, to challenge the growing number of hacking attempts.
Hacking highlight: “Sustained attack” on US called out by intelligence report is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.
Reports are coming in that in the final days of 2012 hackers were able to pull off a major scam using ATM machines and prepaid credit cards. The attack was so successful, that Visa warned all US payment card issuers to be on high alert for additional ATM cash-out fraud schemes in 2013. Sources in the financial industry and law enforcement cited by Krebsonsecurity.com say that thieves made off with approximately $9 million in the scam.
The sources claim that the attackers used a small number of reloadable prepaid debit cards to pull cash out of ATMs in at least a dozen countries. According, to the sources the crooks took approximately $9 million in only a few hours. The sources also claim that around New Year’s Eve the group struck again.
The second attack occurred on ATM networks in India and resulted in the thieves making off with a little less than $2 million according to investigators. This sort of attack is typically avoided because the reloadable, prepaid debit cards are limited to low dollar amounts being withdrawn within a 24-hour period. However, the criminals were somehow able to increase or completely eliminate those withdrawal limits for the accounts they control.
Visa says that the attacks were made possible because the hackers were able to gain access to issuer authorization systems and card parameter information. Once the hackers had access to that information, they were able to manipulate daily withdrawal amount limits, card balances, and other parameters. Visa says that in some instances over $500,000 was withdrawn from a single card within 24 hours.
[via Krebsonsecurity]
Hackers steal millions from ATMs on Christmas Eve is written by Shane McGlaun & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.
Twitter apparently pursuing two factor authentication in wake of security breach
Posted in: Today's ChiliA few days ago, twitter announced that it was targeted by hackers and 250,000 accounts have been compromised. When the attack was discovered, twitter revoked the security tokens for those affected accounts and reset passwords. The account owners were sent e-mails telling them to reset their password.
In the wake of the massive attack, twitter is apparently pursuing improved authentication. Information Week reports that a job listing discovered early this week on the twitter website seeks a software engineer for product security. The job description seeks someone with experience designing and developing user-facing security features including multifactor authentication.
The job also wants the new employee to be familiar with fraudulent login detection techniques. The job listing turned up Monday and Information Week reports that twitter didn’t respond to requests for comment about whether or not it was planning to implement two-factor authentication. A number of large websites do use two-factor authentication, and one of the most notable is PayPal.
Dropbox also now offers two-factor authentication after hackers were able to steal passwords for some user accounts. Interestingly, some of the owners of affected accounts in the big hack discovered recently note that there expired passwords still work when they log into twitter via the twitter API used by third-party tools. Twitter maintains that it reset all passwords for affected accounts. However, it appears that twitter didn’t expire OAuth session tokens allowing third-party applications to continue accessing twitter with expired passwords.
[via Information Week]
Twitter apparently pursuing two factor authentication in wake of security breach is written by Shane McGlaun & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.
Twitter warns of a concerted hacking attempt, says 250,000 might be affected
Posted in: Today's ChiliNow would be a good time to refresh your Twitter password. The social network has revealed that there was at least one attack on its servers this week that may have collected email addresses, passwords (thankfully encrypted) and session tokens for about 250,000 users. The real risk to users is unknown, but Twitter raises our eyebrows when it suggests that this was more than just a casual scripting hack: it claims the intrusion attempt was “extremely sophisticated,” and that other firms might have been subject to a similar breach. You’ll know that you were immediately affected only if you see Twitter send a notice of a forced password reset, like what you see pictured above. We’d be cautious, all the same — when such attempts seemingly increase in frequency by the day, it’s not a bad idea to stay on guard.
Filed under: Internet
Source: Twitter
WSJ and NYT accuse Chinese hackers of infiltrating their newsgathering systems
Posted in: Today's ChiliAnd the saga continues. Just a year after Bloomberg News was reportedly targeted by Chinese hackers, both The Wall Street Journal and The New York Times have independently published reports suggesting that they too are being probed. Both organizations seem to think that it’s all part of a larger scheme, with Chinese hackers sifting through newsgathering systems of outlets that are reporting on touchy subjects. As the Times puts it: “The attacks appear to be part of a broader computer espionage campaign against American news media companies that have reported on Chinese leaders and corporations.”
When asked about such a possibility, China’s Ministry of National Defense (unsurprisingly) denied the allegations, noting that “to accuse the Chinese military of launching cyberattacks without solid proof is unprofessional and baseless.” As it stands, the FBI is already looking into various attacks of this nature, but strangely, the hacking attempts aren’t being universally viewed as malicious. Paula Keve, chief spokeswoman for Dow Jones & Co., stated: “Evidence shows that infiltration efforts target the monitoring of the Journal’s coverage of China, and are not an attempt to gain commercial advantage or to misappropriate customer information.” As you’d expect, both outfits are stepping up security in a major way in hopes of fending off any future attempts.
Filed under: Internet
Google’s Chrome security team has taken the wraps off its latest Pwnium competition. This time out, the target is Chrome OS on a Samsung Series 5 550, and as ever, the company’s putting its money (and nerd cred) where its mouth is, offering up a $Pi million in rewards (that’s a lofty $3.14159 million) for the third round of the competition. Amongst the payouts are $110,000 for a “browser or system level compromise in guest mode or as a logged-in user, delivered via a web page” and $150,000 for a “compromise with device persistence — guest to guest with interim reboot, delivered via a web page.” The company is also putting some weight behind the upcoming Pwn2Own competition, which goes down at CanSecWest in Vancouver in March. More info on both can be found at the source link below.
Filed under: Software
Source: Chromium
The US Cyber Command division, the Pentagon’s cybersecurity team established to tackle a new age of digital threats, will be considerably expanded with new specialists in both offensive and defensive technologies, the Defense Department has confirmed. A trio of task-forces will be established, populated with a fresh intake of experts, with the division “constantly looking to recruit, train, and retain world class cyberpersonnel” a spokesperson told the NYTimes. Recent attacks on US infrastructure left the Defense Department convinced that it needed to bolster its own forces.
The three new divisions will deal with more traditional issues of security, as well as toughening up defenses around US infrastructure. The “cyber protection forces” will be responsible for keeping the Pentagon’s own systems secured, while the “national mission forces” will play a similar role for broader infrastructure, such as the US power grid and other essential components vital to keeping the country moving.
Finally, the “combat mission forces” team will take a more proactive role in warfare, planning and executing attacks. The three new divisions are the handiwork of Defense Secretary Leon E. Panetta, who has previously made ominous public warnings suggesting that cyberterrorism will be the next significant war the US will face. Last year, he coined the term “cyber-Pearl Harbor” to describe an unexpected digital strike on US government and infrastructure.
China, Russia, Iran, and other militant groups have been singled out as potential aggressors, with security officials saying that web-based battles have already commenced; it’s not always clear whether attacks are government-sanctioned or initiated by independent groups. Back in July 2011, the Pentagon confirmed it was treating cyberspace as an operational domain, just as it does land, air, and sea.
US Cyber Command gets new teeth for online warfare is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.
A UK government agency has slapped Sony’s wrist with a £250,000 ($400,000) penalty for not doing enough to protect the personal information of its customers. The fine specifically concerns the large-scale PSN hack in April 2011, which the Information Commissioner’s Office (ICO) says “could have been prevented.” The agency’s head, David Smith, said that the security measures Sony had in place “were simply not good enough.” He added that Sony trades on its technical know-how, and had access to the necessary expertise to protect itself from criminal attacks:
“There’s no disguising that this is a business that should have known better.”
Though the size of the fine might seem piddling for an outfit like Sony, the ICO considers it to be a “substantial” punishment, reflecting the fact that this case is “one of the most serious” that has ever been reported to it. Check out David Smith’s statement and best angry teacher face in the video after the break.
Update: Sony Computer Entertainment Europe emailed us to say that it plans to appeal the decision. The company also agrees with the ICO’s findings that although it was the victim of a focused criminal attack, it was unlikely that personal data accessed was used for “fraudulent purposes”.
Filed under: Gaming, Internet, Sony
Source: ICO